mobile device security
Recently Published Documents


TOTAL DOCUMENTS

59
(FIVE YEARS 11)

H-INDEX

10
(FIVE YEARS 1)

2020 ◽  
Author(s):  
Joshua M. Franklin ◽  
Gema Howell ◽  
Kaitlin Boeckl ◽  
Naomi Lefkovitz ◽  
Ellen Nadeau ◽  
...  

2020 ◽  
pp. 255-274
Author(s):  
Kutub Thakur ◽  
Al-Sakib Khan Pathan

2020 ◽  
Vol 8 (1) ◽  
pp. 119-129
Author(s):  
SHEKH ABDULLAH AL-MUSA AHMED ◽  
NIK ZULKARNAEN KHIDZIR ◽  
TSE GUAN TAN

Keselamatan mudah alih, atau lebih khusus keselamatan peranti mudah alih, menjadi semakin penting dalam pengkomputeran mudah alih untuk literasi digital. Literasi digital adalah kumpulan kecekapan yang diperlukan untuk penyertaan penuh dalam pengetahuan masyarakat. Ini merangkumi pengetahuan, kemahiran, dan tingkah laku yang melibatkan penggunaan alat digital yang berkesan seperti telefon pintar, tablet, komputer riba untuk tujuan komunikasi, ekspresi, kolaborasi dan sokongan. Yang menjadi perhatian utama ialah keselamatan institusi pengajian tinggi kini disimpan di telefon pintar. Seiring dengan perkembangan ini muncul sejumlah masalah keselamatan yang mempengaruhi peranti mudah alih. Peluang untuk memiliki peranti kecil dan kuat yang dihubungkan dengan internet membolehkan komunikasi berlaku dari mana sahaja di institusi pengajian tinggi. Di institusi pengajian tinggi, yang telah melekatkan telefon pintar peribadi mereka ke rangkaian institusi telah mengetahui cara mudah untuk melakukannya. Secara khusus, ada beberapa kes di mana pelajar telah membenarkan capaian peranti mudah alih peribadinya ke rangkaian institusi pengajian tinggi. Walau bagaimanapun, pentadbir sistem menghantar arahan jarak jauh ke peranti dan memerintahkannya untuk menyimpan semua data agar tidak jatuh ke tangan yang salah. Oleh itu kini wujud istilah rooting pada peranti Android. Hal merujuk kepada proses mendapatkan akses root ke peranti. Biasanya, ini melibatkan aplikasi atau skrip yang memberikan akses root kepada pengguna. Setelah akses diberikan, pengguna di institusi pengajian tinggi, dapat melakukan apa sahaja yang diinginkan tanpa sekatan. Namun, salah satu kelemahan proses ini adalah peranti ini terdedah kepada bahaya yang lebih besar dari ancaman luaran. Justeru artikel ini memberi tumpuan kepada masalah keselamatan peranti mudah alih dalam dunia digital di institusi pengajian tinggi. Hal ini bertujuan supaya pelajar institusi memiliki kebolehan kritis dan kreatif ketika melayari media massa, budaya popular dan media digital. Oleh kerana media digital menggunakan telefon pintar untuk maklumat dan artikel ini juga merujuk cara menjaga keselamatan data telefon pintar ini memandangkan kadar capaian maklumat yang semakin kerap dan cepat.   Mobile security, or more specifically mobile device security, has become increasingly important in mobile computing for digital literacy. Digital literacy is the set of competencies required for full participation in knowledge of society. It includes knowledge, skills, and behaviors involving the effective use of digital devices such as smartphones, tablets, and laptops for purposes of communication, expression, collaboration and advocacy. Of particular concern is the security of higher learning institution is now stored on smartphones. Along with this expansion came a number of security issues to affect mobile devices. A chance to have a tiny and powerful device that is Internet linked allows communication from anywhere in the higher learning institution. In higher learning institution, those who have attached their personal smartphones to institutional network would have found out the easy way of doing so. Specifically, there have been a handful of cases where learners who attached their own personal devices to a higher learning institutional network. However, a system administrator sent out a remote command to the device and instructed it to store itself of all data to keep it from falling in the wrong hands. Hence in Android device having heard the term of rooting the device. Concisely, this refers to undertaking a process of gaining root access to a device. Typically, this involves running an application or script that grants root access to the user. Once access is granted, the user in the higher learning institution can do pretty much whatever the institution want on the system without restriction. However, one of the downsides of this process is that the device is now exposed to greater danger from external threats as well. Moreover, this article focuses on mobile device security issues in digital literacy in higher learning institution. It is about developing institutional learners to critical and creative abilities when it comes to mass media, popular culture and digital media. Since digital media is using smartphone for store information and article also referring how to maintain security of these smartphone data.


Author(s):  
Rahul Neware

Mobile Cloud Computing(MCC) is a recent technology used by various users worldwide. In 2015, more than 240 million users used mobile cloud computing which gives a profit of $5.2 billion to service providers. MCC is a combination of Mobile computing and cloud computing. By the combination of these two, it gives various challenges like network access, elasticity, management, availability, security, privacy, etc. Here security issues are considered because both the security issues of mobile computing and cloud computing are considered as important like data security, virtualization security, partitioning security, Mobile cloud application security, Mobile device security. This paper gives a detailed study of security issues in mobile cloud computing and its prevention measures.


2019 ◽  
Vol 21 (2) ◽  
pp. 215-233 ◽  
Author(s):  
Anthony Duke Giwah ◽  
Ling Wang ◽  
Yair Levy ◽  
Inkyoung Hur

Purpose The purpose of this paper is to investigate the information security behavior of mobile device users in the context of data breach. Much of the previous research done in user information security behavior have been in broad contexts, therefore creating needs of research that focuses on specific emerging technologies and trends such as mobile technology. Design/methodology/approach This study was an empirical study that gathered survey data from 390 mobile users. Delphi study and pilot study were conducted prior to the main survey study. Partial Least Square Structural Equation Modeling was used to analyze the survey data after conducting pre-analysis data screening. Findings This study shows that information security training programs must be designed by practitioners to target the mobile self-efficacy (MSE) of device users. It also reveals that practitioners must design mobile device management systems along with processes and procedures that guides users to take practical steps at protecting their devices. This study shows the high impact of MSE on users’ protection motivation (PM) to protect their mobile devices. Additionally, this study reveals that the PM of users influences their usage of mobile device security. Originality/value This study makes theoretical contributions to the existing information security literature. It confirms PM theory’s power to predict user behavior within the context of mobile device security usage. Additionally, this study investigates mobile users’ actual security usage. Thus, it goes beyond users’ intention.


Sign in / Sign up

Export Citation Format

Share Document